Thursday, January 31, 2019

Can I Sue If My Neighbor Has Bees, Livestock?

Urban farming has given way to urban livestock ownership, and now every hippie and hipster in your neighborhood has chickens, bees, and maybe a goat or two. Which is all well and good for the decrease in their food bill every month, but what about the increase in noise and odor coming from their backyards?

The good news is that you may be able to file a nuisance lawsuit to address the problem. The bad news is that such claims are not always easy.

A Neighbor's Nuisance

As a general matter, you have a right to the enjoyment and use of your property. If another party interferes with that right, you may be able to sue. If that interference involves a physical intrusion onto your property, you would sue under trespass. If, however, the interference includes sound, light, or even odors, you may have a claim under private nuisance law. There are three main elements to a successful nuisance lawsuit:

  1. You own the land or have the right to possess it;
  2. The neighbor actually acted in a way that interferes with your enjoyment and use of your property; and
  3. Their interference was substantial and unreasonable.

The third element is often the hardest to prove, as it is intended to prevent people from suing for minor annoyances. Courts will ask whether the interference would be substantial to an ordinary person and weigh the harm caused by the conduct against the burden of preventing the harm and the usefulness of the act. This can be particularly tricky when neighbors are cultivating their property or housing livestock.

Other Options

If the farm next door is truly annoying, you may also check local laws and municipal zoning ordinances to ensure whether such activity is even allowed, and whether your neighbor is in compliance with those statutes. These laws can apply to both farming and livestock. And any homeowners associations may prohibit growing crops, keeping livestock, or selling the spoils of either.

You may be better off trying to solve the dispute privately with your neighbor before taking the matter to court. If not, you can find a local attorney in our directory below.

Related Resources:

Injured?d=yIl2AUoC8zA Injured?d=qj6IDK7rITs Injured?i=2vKNoYhngKk:QlDHR-UHe4o:gIN9vF


source http://blogs.findlaw.com/injured/2019/01/can-i-sue-if-my-neighbor-has-bees-livestock.html

A Preview of ABA TECHSHOW 2019

ABA TECHSHOW is right around the corner! In this episode of The Digital Edge, hosts Sharon Nelson and Jim Calloway give a preview of ABA TECHSHOW 2019 with guests Lincoln Mead and John Simek, co-chairs of the conference board. They share how the conference stays current on tech for lawyers and give tips on how to best prepare for attending the show. There will be some new elements for attendees this year, including a new app for the conference, greater cooperation with educators for the academic track, and more focus on involving young lawyers and law students.

Lincoln Mead is the project manager for Canon Discovery Services and co-chair of the 2019 ABA TECHSHOW board.

John Simek is the Vice President of Sensei Enterprises and co-chair of the 2019 ABA TECHSHOW board.

The post A Preview of ABA TECHSHOW 2019 appeared first on Law Technology Today.

LawTechnologyTodayOrg?d=yIl2AUoC8zA LawTechnologyTodayOrg?d=qj6IDK7rITs


source http://www.lawtechnologytoday.org/2019/01/a-preview-of-aba-techshow-2019/

Wednesday, January 30, 2019

Will Trump Sue Over Latest Tell-All Book?

Another former staffer has dirt to spill on President Donald Trump. And the president again promises legal action, claiming the staffer violated a confidentiality agreement. While Trump is notorious for threatening lawsuits that never materialize, and his administration's non-disclosure agreements have been deemed potentially unenforceable and illegal, could this be the time that Trump actually sues, and the alleged NDA is enforced?

Here's a look.

Vipers' Nest

"Team of Vipers: My 500 Extraordinary Days in the Trump White House" was written by former Trump administration communications aide Cliff Sims, and released this week. Trump responded, as his is wont to do, on Twitter:

A low level staffer that I hardly knew named Cliff Sims wrote yet another boring book based on made up stories and fiction. He pretended to be an insider when in fact he was nothing more than a gofer. He signed a non-disclosure agreement. He is a mess!

-- Donald J. Trump (@realDonaldTrump) January 29, 2019

Despite the dissonance between claiming that a book is both "based on made up stories and fiction" and violates an non-disclosure agreement, Michael Glassner, chief operating officer of Trump's re-election campaign, confirmed the campaign was "preparing to file suit against Cliff Sims for violating" an NDA. (Sims, or his part, does not recall whether he signed an NDA, and responded to Trump's tweet in real-time while promoting the book, "Nice. There it is."

Free Speech Test

So what of Sims's potential legal liability? National security attorney Brad Moss believes that, while the non-disclosure agreement could apply to information Sims gleaned before Trump's inauguration, it would likely be unenforceable when it comes to his time working in the White House. "If the campaign is trying to impose their NDA upon Sims for disclosures tied to his time in the White House, they're going to run into the brick wall of established precedent on the subject," Moss told Law & Crime. "They would in effect be arguing that the court should allow a president's campaign to censor a former federal employee in a way that the government is barred from doing. Good luck with that argument."

As a general rule, government employees (and former employees) who speak out about matters of public concern, government corruption, or gross misconduct are protected from retaliation by the First Amendment, so long as the speech was not pursuant to their job duties and did not cause disruption in the workplace.

So, if Trump in fact follows through on his threat to sue Sims, he could be facing an uphill legal battle.

Related Resources:

Injured?d=yIl2AUoC8zA Injured?d=qj6IDK7rITs Injured?i=4hNF-RGxPXA:XuUSLMsG86k:gIN9vF


source http://blogs.findlaw.com/injured/2019/01/will-trump-sue-over-latest-tell-all-book.html

Sacramento Family Sues Police for Stephon Clark Killing

Shot 20 times by police officers right in front of his grandparents, the family of Stephon Clark has filed a $20 million federal lawsuit against the city of Sacramento for wrongful death, excessive force, and false arrest. They are seeking punitive damages. Clark, an unarmed black father of two, was shot to death in his grandparents' backyard in March of 2018, all while the grandparents "watched in horror."

Officer Involved Fatal Shooting of Stephon Clark

Police officers Terrence Mercadel and Jared Robinet responded to a call of a man vandalizing vehicles in the neighborhood. Police helicopters were used to locate the suspect. As as result, Mercadel and Robinet started chasing Clark, and eventually gunned him down, with 20 shots hitting Clark, up to six in his back.

Officers claimed they thought Clark was armed, but it turned out the only thing on him was a cell phone. Sacramento District Attorney Anne Marie Schubert is still deciding whether or not to press criminal charges against the two officers, thus leaving the plaintiffs with civil action as the only currently possible venue of vindication for Clark and his family.

Wrongful Death Suit

Proving wrongful death may not be too difficult for the plaintiffs. By a preponderance of the evidence, they must prove:

  • The death of a human being;
  • Caused by another's negligence, or with intent to cause harm;
  • The survival of family members who are suffering monetary injury as a result of the death, and;
  • The appointment of a personal representative for the decedent's estate.

Clark is dead. It appears the officers were trying to cause harm when they dislodged their weapons 20 times. As a young father of two, he had many years of earning potential ahead of him, which his sons were relying upon. However, wrongful deaths at the hands of police officers rarely result in $20 million verdicts. A 2015 study by the Washington Post found settlements ranged from $7,500 to $8.5 million, which a median amount of $1.2 million. Also, settlements were more lucrative than jury awards.

Laws Created as a Result Of Clark's Death

One issue plaintiffs will face in dealing with this lawsuit is evidence. The officers muted their body cameras right after shooting Clark, sparking outrage among the community, and raising issues about when it is appropriate for police officers to do so. As a result, then-Governor Brown signed two bills loosening confidentiality rules regarding records of police misconduct, based in part on the shooting of Stephon Clark. Senate Bill 1421 makes investigations and reports related to an officer's deadly use of force subject to California's Public Records Act Assembly Bill 748 makes it easier to obtain body cam footage taken by police officers when they use deadly force.

If you believe that a police officer used excessive force in apprehending you or someone you love, contact a local personal injury attorney.

Related Resources:

Injured?d=yIl2AUoC8zA Injured?d=qj6IDK7rITs Injured?i=55QIQArsba4:rRF2Fmh-buo:gIN9vF


source http://blogs.findlaw.com/injured/2019/01/sacramento-family-sues-police-for-stephon-clark-killing.html

keeping technology simple in 2019

As 2019 continues on, there are a few themes that stand out as far as keeping technology simple for this year. To achieve our nation’s pressing access to justice needs and to close the education gap, we need to look to software and solutions that are open source or freely available. In addition, simplicity is a key component, whether for access or use.

Taking a step back, we have heard a lot about the law becoming client centric, which is a dramatic shift from the days of hanging out a shingle for a static offering that the consumer must purchase or go elsewhere. Meeting the client where they are is fast becoming the norm for attorneys. Also, there is a continued pressure on fees, and too often technology is seen as the savior for the practice and access to justice.

Blind adoption of any technology, whether free or some open source solution, is risky unless you examine both process and data.  This review must be based making the client experience simple, and that means for all users, whether consumer or attorney. How many times have you purchased a new gadget or application and months later realized that you are not using it or simply forgot to implement? LegalShield’s Access Advocate, Mary Juetten has written about “Process before Purchase; Data before Decision” here and I believe this is a key component to adopting and implementing technology that works for both your firm and clients.

In addition, I have seen many solutions that purport to make lawyers lives easier and therefore, improve the client experience but, the firms do not implement because of the total software costs, including the time and effort needed for implementation. LegalShield provider attorney Wayne Hassay has been writing about his technology efforts here. Wayne’s journey informs us that even free software requires people’s time and effort for selection and evaluation. A cautionary note, the hours that the attorneys must devote to implementation will not disappear with free solutions.

That all said, it’s an exciting time for the legal profession. Advancements in cloud software, from basic office tools and project management solutions to expert systems and artificial intelligence, have drastically cut the cost of technology.  With the legal industry lagging behind others, lawyers can adopt best practices for serving clients from other professions, like accounting and financial services. Lessons learned can then reduce the implementation time and therefore, cost for firms for these open source or free options.  Without naming actual solutions, my prediction is that the following will help close the access to justice gap in 2019:

  • Mobile Applications– not lists of lawyers nor complicated, multi-step applications but simple apps that either link consumers with attorneys or the information that they require. Client centric apps are those that all age groups can easily use, not just the young.
  • Question and Answer Chatbots – using artificial intelligence for chatbots has become trendy but, by having frequently asked questions or legal information available, can empower the consumer to understand their needs.
  • Legal Checkups – checklists or triage questions that can both educate the potential client and save the attorney time upfront. As the research has shown, many Americans do not understand that their problem can be solved by a lawyer.
  • Booking links or Calendar software – Clio’s Legal Trends report again cited that responsiveness is most important to clients when selecting an attorney. There are many free calendar plugins, whether as an email signature or on the firm website, that allow for instant appointment booking.
  • Free Legal Forms – This can tie into the mobile applications, but the idea is to provide free information and forms to clients to help with the process. The lawyer then advises rather than collecting fees for preparing documents.

A key component to remember is that clients range in age and technical proficiency and therefore, the technology must be simple. That said, we all spend hours daily on our devices and the legal apps and solutions should be no different in design and degree of difficulty to be successful. Finally, gone are the days when lawyers can hoard forms and legal information; we must educate Americans and provide a law firm in the palm of their hands.

Join us at Elevate by LegalShield 2019, where technology and access to justice are both being discussed, more information is available  here. As always, feel free to reach out to me on twitter @gundog8.

The post keeping technology simple in 2019 appeared first on Law Technology Today.

LawTechnologyTodayOrg?d=yIl2AUoC8zA LawTechnologyTodayOrg?d=qj6IDK7rITs


source http://www.lawtechnologytoday.org/2019/01/keeping-technology-simple/

Tuesday, January 29, 2019

Professor Sues State, University for Not Covering Transgender Surgery

Dr. Russell Toomey is an Associate Professor of Family Studies and Human Development at the University of Arizona, researching issues of prejudice, stereotyping, and discrimination against lesbian, gay, bisexual, transgender, and queer (LGBTQ) adolescents and Latinx youth. Dr. Toomey is also a transgender man, who transitioned to live consistently with his male identity in 2003 and sought a hysterectomy in 2018.

His healthcare plan, provided by the state to state university employees, refused to cover the surgery, and, in fact, denies all coverage or "[g]ender reassignment surgery." Dr. Toomey has since filed a class action lawsuit against the state, and the University of Arizona, claiming the healthcare plan discriminates against transgender employees "because of ... sex" in violation of Title VII of the Civil Rights Act deprives transgender employees of equal treatment under the Equal Protection Clause of the Fourteenth Amendment. Here's a look.

Medically Necessary, but Not Necessarily Covered

Dr. Toomey's treating physicians recommended that he receive a hysterectomy as a medically necessary treatment for gender dysphoria, as provided by the World Professional Association for Transgender Health's standards of care. Arizona's healthcare plan provides coverage for the same surgery when prescribed as medically necessary treatment for other medical conditions. And, all four of the plan's medical providers adopted internal policies and guidelines that authorize hysterectomies as medically necessary for gender dysphoria. Still, the plan does not cover hysterectomies when performed as part of transition-related care.

According to Dr. Toomey's lawsuit:

The Plan generally provides coverage for medically necessary care, but singles out transgender employees for unequal treatment by categorically denying all coverage for "[g]ender reassignment surgery" regardless of whether the surgery qualifies as medically necessary treatment. As a result, transgender individuals enrolled in the Plan have no opportunity to demonstrate that their transition-related care is medically necessary, and they have no opportunity to appeal any adverse determination to an independent reviewer.

"Arizona provides the same discriminatory health plan to nearly all state employees and their dependents," Dr. Toomey wrote on the ACLU's "Speak Feely" blog. "That means hundreds, if not thousands, of transgender state employees or transgender dependents of state employees cannot receive medically necessary care."

State of Coverage

Coverage for transgender surgery can vary from insurance plan to insurance plan, and from state to state. Federal judges have ruled that Wisconsin can't block insurance companies from covering transgender healthcare costs, and that Massachusetts was required to provide gender reassignment surgery for prison inmates.

Dr. Toomey's lawsuit, which could include hundreds or thousands of state employees, is asking the state to remove the exclusion for gender reassignment surgery, and adopt a standard policy for assessing medical necessity of surgeries associated with transgender healthcare.

Related Resources:

Injured?d=yIl2AUoC8zA Injured?d=qj6IDK7rITs Injured?i=xLmGfJCSo8E:1T0l57UxmdI:gIN9vF


source http://blogs.findlaw.com/injured/2019/01/professor-sues-state-university-for-not-covering-transgender-surgery.html

Social Media 101: What’s the Point of Social Media After All?

As an attorney, you might believe that social media is just something a bunch of millennials are into. But it’s so much more than that. Having an active social media presence can go a long way toward building and enhancing your online brand.

In working with attorneys over the last few years, I’ve heard two different lines of thinking from those who chose to forego any type of social media presence:

“I don’t understand it so I don’t want it.”

Or…

“It’s a waste of time because it doesn’t generate leads.”

In this article, I want to explain the purpose of social media and hopefully answer some lingering questions you might have about this incredible tool.

Why Is Social Media Important?

Social media is a key branding tool because it’s an easy way to expose your business to your community with the push of a button. If you’re doing an e-newsletter or any kind of direct mail campaign, you can look at social media as a small, daily version of that kind of marketing. Where social media has an advantage, however, is that you can reach your entire community (or the entire country if that’s your target market) with your social media content.

If your email or physical address list is pretty small, social media allows you to reach the rest of your market. Whether you live in a city of 500,000, or a smaller town of 60,000, social media allows you to reach the people you serve for a fraction of the cost of other forms of marketing.

Even though Facebook, social media’s biggest platform, has recently curbed the influence advertisers like you can have on everyone’s timelines, there are still ways you can reach thousands of people in your community every month, and it’s something we have continued to do successfully despite Facebook’s changes.

Beyond Facebook, regularly making posts on Twitter and LinkedIn can enhance your brand and give you influencer authority and credibility as the expert in your city. From there, the referrals can grow. If a personal injury attorney needs to send you a family law case, a strong social media presence only increases the chances that attorney will think of you first because they’ve seen your content posted across social media.


Can Social Media Generate Leads?

Sure it can. But you could also generate leads by standing on the side of the highway and holding a sign with your logo on it. In other words, social media isn’t necessarily going to be a big lead magnet for you.

The more beneficial approach to social media is to use it as a way to reach people in your community and create a consistent touchpoint with those people, making you a truly unforgettable figure in their lives. You can promote your website and the things you’re doing outside of the office to show people that you’re not only an expert and the go-to attorney for your practice area, but that you’re committed to actually helping people rather than chasing down a big pay day.

What Channels Should You Use?

At Spotlight Branding, we push our clients’ content to Facebook, Twitter, LinkedIn, and Google+. While some have more users than others, these outlets provide the most value for an attorney because chances are all but a small percentage of your market is on one of these sites.

Other services, such as Instagram, are becoming more and more appropriate for businesses, including law firms. But when it comes to Instagram, it’s best to use it as a “behind the scenes” platform to show people what you’re doing in the community and in the office.

Another visual platform, Pinterest, is also gaining steam. And while some businesses are seeing great results with both Pinterest and Instagram, it’s coming from industries that provide a physical product, such as clothiers or food service providers. As an attorney, your sweet spot is on the bigger networks that we focus on.

What Should You Post?

It’s okay to promote yourself on social media. After all, how else will people know what you do and how you can help them? But you need to provide a balance of other content.

Constantly promoting yourself and telling people to call your office every single day is just going to turn them off and contribute to the stereotype that attorneys are just about the money. It’s all about providing value and becoming a source of solid, relevant, and authoritative content to your audience.

Along with promoting your website’s blogs or videos, you can also mix in relevant articles from outside sources and inspirational quotes. People on social media really love quotes, and it’s a great way to spark engagement with people on your page.


How Is Social Media Different from Other Marketing?

Think of it like this: Social media is a digital version of every kind of print and physical advertising you have ever done. Where social media has the advantage, however, is that you can change up the message on a daily basis for a fraction of the cost. If you’ve been running your law firm for years, you’ve likely bought ad space in a newspaper, phone book, or even a billboard. These advertisements cost thousands of dollars for a static advertisement that is seen only by the people who subscribe to that publication or drive along that particular road where the billboard is located.

Social media, on the other hand, can transmit a different message every day to a custom audience based on the demographics of your ideal client. If you’re a business attorney, you can target people who have interests in business and entrepreneurship, and even narrow it down to people whose job titles include things like “Founder,” “Owner,” etc. Whereas a billboard along the interstate could cost you up to five figures for a month and reach an unknown number of qualified people, a finely tuned social media audience can target thousands of people in your market.

As you can see, social media is more than just a time-wasting diversion that your kids stare at all day. It can be a helpful tool to grow your referral base and establish your credibility and authority as THE legal expert in your community.

The post Social Media 101: What’s the Point of Social Media After All? appeared first on Law Technology Today.

LawTechnologyTodayOrg?d=yIl2AUoC8zA LawTechnologyTodayOrg?d=qj6IDK7rITs


source http://www.lawtechnologytoday.org/2019/01/social-media-101-whats-the-point-of-social-media-after-all/

Monday, January 28, 2019

Fertility Clinic Sued for Cryo Tank Malfunctions

Over 70 lawsuits have now been filed against University Hospitals Fertility Center in Beachwood, Ohio, as well as CAS DataLoggers. These two parties are at the center of a series of unfortunate events that led to the destruction of approximately 4,000 eggs and embryos after the cryo-facility inadvertently warmed-up to unsafe temperatures for an unknown period of time back on March 4, 2018.

The statute of limitations for medical malpractice claims is one year. Thus, expect to see more fillings as we head closer to the one year anniversary of this disastrous event that led to heartbreak for many families seeking fertility treatment.

Fertility Freezer Meltdown

According to University Hospitals officials, the temperature in the storage tanks warmed up to unsafe levels for an unknown period of time. Though it is unclear why the tanks warmed, the alarm system on the tanks should have alerted employees about the temperature swing. But for some reason, the system had been turned off.

According to the letter immediately informing the nearly 1,000 clients affected by this tragedy, "We don't know who turned off the remote alarm nor do we know how long it was off," the letter stated. "We are still seeking those answers." Since that time, University Hospitals has apologized and offered free fertility services to those affected.

Malpractice Lawsuits Allege Negligence, but Could Rise to Wrongful Death

Those individuals and families that have suffered from this meltdown have filed lawsuits and claims against the University Hospitals and CAS DataLoggers, the company responsible for monitoring the remote alarm. For many, apologies and free services aren't enough. "The loss suffered by our clients is devastating," said Adam Wolf, attorney with the law firm Peiffer Wolf Carr and Kane, representing about 100 of the nearly 1,000 families affected. "Those eggs and embryos represented the hopes of having children for hundreds of American families."

Some families have already settled breach of contract and negligence lawsuits with the defendants. According to a statement issued by University Hospitals, "UH has worked with Fertility Center patients and their lawyers over the past year to negotiate a significant number of settlements and will continue offering resolution alternatives to our patients who want to avoid the time, expense, and anxiety of litigation." However, one family is looking to file a more unique lawsuit against University Hospitals. Rick and Wendy Penniman are seeking a legal declaration that their lost embryos should be considered living people, not property. If granted, the Pennimans could file a different lawsuit, potentially wrongful death.

If you or someone you love has lost eggs or embryos due to equipment malfunction or human error, contact a local personal injury attorney. This sort of loss can be very devastating, especially for those that may have a compounded situation. A lawyer can listen to the facts of your case, and offer you good advice on your opportunity to recover for your losses.

Related Resources:

Injured?d=yIl2AUoC8zA Injured?d=qj6IDK7rITs Injured?i=VYr-4zBhQEg:EsI5wGYnZpc:gIN9vF


source http://blogs.findlaw.com/injured/2019/01/fertility-clinic-sued-for-cryo-tank-malfunctions.html

TECHREPORT 2018: Cybersecurity

Security breaches are so prevalent that there is a new mantra in cybersecurity today—it’s “when, not if” a law firm or other entity will suffer a breach. In an address at a major information security conference in 2012, then-FBI director Robert Mueller put it this way:

“I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.”

Mueller’s observation continues to be true today for attorneys and law firms as well as for small businesses through large global companies. There have been numerous reports for over a decade of law firm data breaches in the popular and legal press—print and online. The FBI has reported that law firms are often viewed as “one-stop shops” for attackers (with information on multiple clients) and it has seen hundreds of law firms being increasingly targeted by hackers. Law firm breaches have ranged from simple (like those resulting from a lost or stolen laptop or mobile device) to highly sophisticated (like the deep penetration of a law firm network, with access to everything, for a year or more).

New York Ethics Opinion 1019 warned attorneys in May 2014 about this threat environment:

“Cyber-security issues have continued to be a major concern for lawyers, as cyber-criminals have begun to target lawyers to access client information, including trade secrets, business plans and personal data. Lawyers can no longer assume that their document systems are of no interest to cyber-crooks.”

Several years later, ABA Formal Opinion 477, “Securing Communication of Protected Client Information” (May 11, 2017), observed:

“At the same time, the term ‘cybersecurity’ has come into existence to encompass the broad range of issues relating to preserving individual privacy from intrusion by nefarious actors throughout the Internet. Cybersecurity recognizes a … world where law enforcement discusses hacking and data loss in terms of ‘when,’ and not ‘if.’ Law firms are targets for two general reasons: (1) they obtain, store and use highly sensitive information about their clients while at times utilizing safeguards to shield that information that may be inferior to those deployed by the client, and (2) the information in their possession is more likely to be of interest to a hacker and likely less voluminous than that held by the client.”

Most recently, ABA Formal Opinion 483, “Lawyers’ Obligations After an Electronic Data Breach or Cyberattack” (October 17, 2018) starts with the following observations about current threats:

“Data breaches and cyber threats involving or targeting lawyers and law firms are a major professional responsibility and liability threat facing the legal profession. As custodians of highly sensitive information, law firms are inviting targets for hackers. In one highly publicized incident, hackers infiltrated the computer networks at some of the country’s most well-known law firms, likely looking for confidential information to exploit through insider trading schemes. Indeed, the data security threat is so high that law enforcement officials regular regularly divide business entities into two categories: those that have been hacked and those that will be.”

The ABA’s 2018 Legal Technology Survey Report explores security threats and incidents and safeguards that reporting attorneys and their law firms are using to protect against them. As in past years, it shows that many attorneys and law firms are employing some of the safeguards covered in the questions and generally increasing use of the safeguards over time. However, it also shows that many are not using security measures that are viewed as basic by security professionals and are used more frequently in other businesses and professions.

Some attorneys and law firms may not be devoting more attention and resources to security because they mistakenly believe “it won’t happen to me.” The increasing threats to attorneys and law firms and the reports of security breaches should dispel this mistaken viewpoint. Significantly, 23% of respondents overall reported this year that their firm had experienced a data breach at some time.

Data security is addressed most directly in 2018 Survey, “Volume I: Technology Basics & Security.” It is further addressed in “Volume IV: Marketing and Communications Technology,” and “Volume VI: Mobile Lawyers.” This TECHREPORT reviews responses to the security questions in this year’s Survey and discusses them in light of both attorneys’ duty to safeguard information and standard information security practices. Each volume includes a Trend Report, which breaks down the information by size of firm and compares it to prior years, followed by sections with more detailed information on survey responses. This gives attorneys and law firms (and clients) information to compare their security posture to law firms of similar size.

Attorneys’ Duty to Safeguard Information

The ethics rules require attorneys to take competent and reasonable measures to safeguard information relating to clients (ABA Model Rules 1.1 and 1.6 and Comments). These duties are covered in these rules and comments and in the recent ethics opinions like the ones discussed above. Attorneys also have common law duties to protect client information and often have contractual and regulatory obligations to protect information relating to clients and other personally identifiable information, like health and financial information. These duties present a challenge to attorneys using technology because most are not technologists and often lack training and experience in security. Compliance requires attorneys to understand limitations in their knowledge and obtain sufficient information to protect client information, to get qualified assistance if necessary, or both. These obligations are minimum standards—failure to comply with them may constitute unethical or unlawful conduct. Attorneys should aim for security that goes beyond these minimums as a matter of sound professional practice and client service.

Recognizing the Risk

Information security starts with an inventory and risk assessment to determine what needs to be protected and the threats that it faces. The inventory should include both technology and data. You can’t protect it if you don’t know that you have it and where it is.

Comment [18] to Model Rule 1.6 includes a risk-based approach to determine reasonable measures that attorneys should employ. The first two factors in the analysis are “the sensitivity of the information” and “the likelihood of disclosure if additional safeguards are not employed.” This analysis should include a review of security incidents that an attorney or law firm has experienced and those experienced by others—generally and in the legal profession. The 2018 Survey includes information about threats in its questions about security breaches.

The next factors in the risk analysis cover available safeguards. Comment [18] to Model Rule 1.6 includes them in the risk analysis for attorneys for determining what is reasonable:

“…the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer’s ability to represent clients (e.g., by making a device or important piece of software excessively difficult to use).”

Comment [18] uses a risk-based approach that is now standard in information security. The 2018 Survey includes information about the available safeguards that various attorneys and firms are using.

The 2018 Survey reports that about 23% of respondents overall reported that their firms had experienced a security breach at some point. The question is not limited to the past year, it’s “ever.” A breach broadly includes incidents like a lost/stolen computer or smartphone, hacker, break-in, or website exploit. This compares with 22% last year, 14% in 2016, 15% in 2015, 14% in 2014, and 15% in 2013—an increase of 8% in 2017 after being basically steady from 2013 through 2016.

This year, the reported percentage of firms experiencing a breach generally increased with firm size, ranging from 14% of solos, 24% of firms with 2-9 attorneys, about 24% for firms with 2-9 and 10-49, 42% with 50-99, and about 31% with 100+. As noted above, this is for firms who have experienced a breach ever, not just in the past year.

Larger firms have more people, more technology, and more data, so there is a greater exposure surface, but they also should have more resources to protect them. It is difficult to tell the completeness of larger firm’s responses on breaches because the percentage of those reporting that they “don’t know” about breaches (18% overall) directly goes up with firm size—reaching 57% in firms with 100-499 attorneys and 61% in firms with 500+. This makes sense because attorneys in medium and large firms may not learn about security incidents that don’t impact the entire firm, particularly minor incidents and ones at remote offices.

The majority of respondents—60%—reported that their firm had not experienced a breach in the past. Hopefully, this does not include firms that have experienced a security breach and never detected it. Another common saying in security today is that there are two kinds of companies: Those that have been breached and know it, and those that have been breached but don’t know it. The same is likely true for law firms.

The most serious consequence of a security breach for a law firm would most likely be unauthorized access to sensitive client data (although the loss of data would also be very serious). The 2018 Survey shows a very low incidence of this result for firms that experienced a breach—about 6% overall, up from 1% last year. The reports of unauthorized access to sensitive client data by firms that experienced a breach is 11% for solos (up from none last year); 6-8% for firms with 2-9, 10-49, and 50-99; none reported for firms with 100+. While the percentages are low, any exposure of client data can be a major disaster for a law firm and its clients.

The information on breaches with exposure of client data is incomplete because almost 7% overall report that they don’t know about the consequences, with “don’t know” responses increasing from none for solos to 38% for firms of 500+. The uncertainty is increased by the high percentage of respondents (18%), discussed above, who don’t even know whether their firm experienced a data breach.

Unauthorized access to non-client sensitive data is 6% overall, with 8% for solos, 5% for firms with 2-9, 10% for firms with 10-49, 8% for firms with 50-99, 5% for firms of 100-499, and none for firms with 500+.

The other reported consequences of data breaches are significant. Downtime/loss of billable hours was reported by 41% of respondents; consulting fees for repair were reported by 40%; destruction or loss of files by 11%, and replacement of hardware/software reported by 27% (percentages for firms that experienced breaches). Any of these could be very serious, particularly for solos and small firms that may have limited resources to recover. No significant business disruption or loss was reported by 65% overall.

About 9% overall responded that they notified a client or clients of the breach. The percentage reporting notice to clients ranges from 11% for solos, 8% for firms with 2-9, 7% for firms with 10-49, 17% for firms with 50-99, none for firms with 100-499 and 19% for firms with 500+. This is equal to or in excess of the reported incidence of unauthorized access to client data for firms of each size, consistent with the view that ethical and common law obligations require notice to clients.

Overall, 14% of respondents that experienced a breach reported that they gave notice to law enforcement, ranging from 13% for solos, 10% with 2-9 attorneys, 20% of firms with 10-49, 25% of firms with 50-99, 5% of firms with 100-499 attorneys to 25% of firms with 500+.

The 2018 Survey also inquired whether respondents ever experienced an infection with viruses/spyware/malware. Overall, 40% reported infections, 37% reported none, and 23% reported that they don’t know. Reported infections were greatest in firms with 10-49 attorneys (57%) and 2- 9 (48%), and lowest in firms with 500+ (20%). Infections can cause serious consequences, including compromise of confidentiality and loss of data. With over one third of respondents reporting infections (down from almost half last year), strong safeguards to protect against them, including up to date security software, using current versions of operating systems and software, promptly applying patches to the operating system and all application software, effective backup, and training of attorneys and staff are clearly warranted.

Security Programs and Policies

At the ABA Annual Meeting in August, 2014, the ABA adopted a resolution on cybersecurity that “encourages all private and public sector organizations to develop, implement, and maintain an appropriate cybersecurity program that complies with applicable ethical and legal obligations and is tailored to the nature and scope of the organization and the data and systems to be protected.” The organizations covered by it include law firms.

A security program should address people, policies and procedures, and technology. All three areas are necessary for an effective program. Security should not be left solely to IT staff and tech consultants. In addition to measures to prevent security incidents and breaches, there has been a growing recognition that security includes the full spectrum of measures to identify and protect information assets and to detect, respond to, and recover from data breaches and security incidents. Security programs should cover all of these functions.

An important initial step in establishing an information security program is defining responsibility for security. The program should designate an individual or individuals responsible for coordinating security—someone must be in charge. It should also define everyone’s responsibility for security, from the managing partner or CEO to support staff.

While a dedicated, full-time Chief Information Security Officer is generally only appropriate (and affordable) for larger law firms, every firm should have someone who is responsible for coordinating security. The larger the firm, the more necessary it is to have a full-time security officer or someone who is to dedicate an appropriate part of their time and effort to security. The 2018 Survey asks who has primary responsibility for security in respondents’ firms. As expected, responses vary by size of firm. The respondent has primary responsibility in solo firms (84%), the respondent or an external consultant/expert in firms of 2-9 attorneys (27% and 33%, respectively); IT staff for firms of 10-49 attorneys (41%) and 50-99 (47%), a chief information officer in firms of 100-499 (56%) and firms of 500+ (62%). A small percentage (2%) report that nobody has primary responsibility for security—a high-risk situation.

The 2018 Survey asks respondents about a variety of technology-related policies, rather than about an overall comprehensive information security program. Attorneys and law firms should view these kinds of policies as part of a coordinated program rather than individually.

According to the 2018 Survey, 53% of respondents report that their firms have a policy to manage the retention of information/data held by the firm, 50% report a policy on email use, 44% for internet use, 41% for computer acceptable use, 37% remote access, 38% for social media, 21% personal technology use/BYOD, and 32% for employee privacy. The numbers generally increase with firm size. For example, about 33% of solo respondents report having an information/data retention policy, increasing to 51% in firms with 2-9, 60% with 10-49, 77% with 50-99, and approximately 90% in 100+ attorneys.

Two responses that raise a major security concern are those that report having no policies (29% overall) and those reporting that they don’t know about security policies (7%). There is a clear trend by firm size in the responses of having no policies. There are no respondents in firms of 100+ attorneys reporting none. The percentage with none generally decreases by firm size, ranging from 3% of firms with 50-99, 6% with 10-49, 25% in firms with 2-9, to 58% of responding solos. While it is understandable that solos and smaller firms may not appreciate the need for policies, all firms should have policies, appropriately scaled to the size of the firm and the sensitivity of the data.

Incident response is a critical element of an information security program. Overall, 25% report having an incident response plan. The percentage of respondents reporting that they have incident response plans varies with firm size, ranging from 9% for solos and 16% for firms with 2-9 to approximately 70% forms with 100+. As with a comprehensive security program, all attorneys and law firms should have an incident response plan scaled to the size of the firm. For solos and small firms, it may just be a checklist plus who to call for what, but they should have a basic plan.

Security awareness is a key to effective security. There cannot be effective security if users are not trained and do not understand the threats, how to protect against them, and the applicable security policies. Obviously, they can’t understand policies if they don’t even know whether their law firm has any policies.

In accordance with the ABA resolution on cybersecurity programs (and generally accepted security practices), all attorneys and law firms should have security programs tailored to the size of the firm and the data and systems to be protected. They should include training and constant security awareness.

Security Assessments and Client Requirements

Clients are increasingly focusing on the information security of law firms representing them and using approaches like required third-party security assessments, security requirements, and questionnaires.

The increased use of security assessments conducted by independent third parties has been a growing security practice for businesses and enterprises generally. Law firms have been slow to adopt this security tool, with only 28% of law firms overall reporting that they had a full assessment, but it increased from 27% last year and 18% in 2017. Affirmative responses generally increase by size of firm.

Third-party assessments are often conducted for law firms only when a client requests it or requires it. Overall, 11% report that a client or prospective client has requested an audit or other review. The percentage of firms reporting a client request gradually goes up by size of firm, from 2% for solos to 39% for firms of 500+.

Overall, 34% of respondents report that they have received a client security requirements document or guidelines. Firms receiving them generally increase by size of firm, from 15% of solos to about 66% with 100+ attorneys. There is a growing recognition in the information security profession of the importance of securing data that business partners and service providers can access, process, and store. This includes law firms. In March of 2017, the Association of Corporate Counsel (ACC) published the Model Information Protection and Security Controls for Outside Counsel Possessing Company Confidential Information that provides a list of baseline security measures and controls that legal departments can consider in developing requirements for outside counsel. Attorneys and law firms are likely to continue to face increasing client requirements for security.

Cyber Insurance

As the headlines continue to be filled with reports of data breaches, including law firms, there has been a growing recognition of the need for cyber insurance. Many general liability and malpractice policies do not cover security incidents or data breaches. The percentage of attorneys reporting that they have cyber liability coverage is small but has been increasing—34% overall (up from 27% in 2017, 17% in 2016, and 11% in 2015). It gradually increases from 27% for solos to about 35-45% for midsize firms, then drops to 23% for firms of 500+. In addition to cyber liability insurance, covering liability to third parties, there is also coverage available for first-party losses to the law firm (like lost productivity, data restoration, and technical and legal expenses). A review of the need for cyber insurance coverage should be a part of the risk assessment process for law firms of all sizes.

Security Standards and Frameworks

A growing number of law firms are using information security standards and frameworks, like those published by the International Organization for Standardization (ISO), the National Institute of Standards and Technology (NIST), and the Center for Internet Security (CIS). They provide consensus approaches to a comprehensive information security program. Some firms use them as guidelines for their security programs, while a smaller group of firms seek formal security certification. The 2018 Survey asks whether respondents’ firms have received a security certification. Overall, only 9% report that they have received certification, with a low of 3% for solos and a high of 27% for firms with 500+.

Authentication and Access Control

Authentication and access controls are the first lines of defense. They are the “keys to the kingdom”—controlling access to networks, computers, and mobile devices.

The 2018 Survey includes a general question about mandatory passwords without specifying the access for which they are required. Overall, 68% of respondents report using mandatory passwords. They are required by 53% of solos, 71% of firms of 2-10 attorneys, and about 80% or higher for larger firms. This question does not ask about other forms of authentication like fingerprints or facial recognition. Some form of strong authentication should be required for access to computers and networks for all attorneys and all law firms.

For laptops, a strong majority of responding attorneys—nearly all—report that they use access controls. Overall, 98% report using passwords, with 99% for solos, 98% for firms of 2-9 attorneys, 94% for firms of 10-49, and firms of 50-500+ at 100%. In addition, 19% overall report using other authentication, which would include fingerprint readers, facial recognition, and other alternatives. While this might suggest that all attorneys use some form of access control (98% + 19%), that is not the case. About 1% report that they use none of the listed laptop security measures. The response of “none” only includes solos and firms 10-49 attorneys. As noted above, larger firms report 100% use of passwords for laptops.

Use of authentication controls on smartphones is similar to those on laptops. Reported use of passwords is 92% overall—generally increasing with firm size from 87% for solos to 100% for firms of 500+. Firms of other sizes range from about 90% to 99%. Use of other authentication is 40% overall, while 5% reporting none of the listed security measures.

For both laptops and smartphones (as well as other mobile and portable devices), all attorneys should be using strong passwords or other strong authentication.

Most, if not all, attorneys need multiple passwords for a number of devices, networks, services, and websites—for both work and personal use. It is recommended that users have a different, strong password for each device, network, service, and website. While password standards are evolving—stressing length over complexity—it is very difficult, or impossible, to remember numerous passwords. Password management tools allow a user to remember a single, strong password for the tool or locker with automatic access to the others. Respondents report that 24% overall use password management tools. 16% report that they don’t know. It is unlikely that respondents who don’t know are using these tools because a user would have to know that they are using a single password to access others. There is some difference in use by size of firm, ranging from a low of 16% for firms with 50-99 attorneys to a high of 30% for firms with 100-499.

Encryption

Encryption is a strong security measure that protects data in storage (on computers, laptops, smartphones, tablets, and portable devices) and transmitted data (over wired and wireless networks, including email). Security professionals view encryption as a basic safeguard that should be widely deployed. It is increasingly being required by law for personal information, like health and financial information. The recent battle between the FBI and Apple and the current debate about mandated “backdoors” to encryption for law enforcement and national security show how strong encryption can be for protecting sensitive data. The 2018 Survey shows that use by attorneys of the covered encryption tools has been growing, but its use is limited.

Full-drive encryption provides strong protection for all of the data on a server, desktop, laptop, or portable device. The data is readable only when it is decrypted through use of the correct password or other access control. Respondents report an overall use of full-drive encryption of only 24% (up from 21% last year and 15% in 2016), ranging from 15% for solos to about 48% for firms of 100+, with percentages increasing by firm size. File encryption protects individual files rather than all the data on a drive or device. Reported use of file encryption is higher than full disk at 46% overall, ranging from 36% for solos to 72% in firms of 500+. This question is general and is not broken down in Volume I of the 2018 Survey by servers, desktops, laptops, smartphones, etc. As discussed below, all attorneys should use encryption on laptops, smartphones, and mobile devices. While some law firms are starting to encrypt desktops and firm servers, it is not yet a common practice.

Volume VI of the 2018 Survey has separate questions for laptops and smartphones. For laptops, 25% overall report using file/data encryption and 18% report using hard drive encryption. Both of these numbers are down slightly from last year. File/data protection relies on the user to encrypt individual files or to put sensitive information in an encrypted file or partition on the drive. Full-drive encryption provides broader protection because it protects all data on the drive. Use of full-drive encryption for laptops does not vary directly with firm size—reported use is 18% for solos, 13% for firms with 2-9, 26% for firms with 10-49, 18% of firms with 50-99, 30% of firms with 100-499, and only 15% of firms with 500+ attorneys.

The 2018 Survey also reported on additional security measures for laptops, like remote data wiping (12% overall) and tracking software (7% overall). These kinds of measures can provide additional security, but should not be a substitute for strong authentication and encryption.

Use of encryption on smartphones appears to be significantly under-reported by attorneys responding to the 2018 Survey, as in past years. Respondents report an overall use of encryption of smartphones by only 18%. However, 72% overall of attorneys who use smartphones for work report using iPhones and 94% report that they use password protection on their smartphones. On current iPhones, encryption is automatically enabled when a PIN or passcode is set. Google is also moving to automatic encryption with a PIN or swipe pattern for Android devices. It appears that many attorneys are using encryption on their smartphones without knowing it. Encryption can be that easy! Encryption of laptops may also be under-reported because it can be transparent to the user if it has been enabled or installed by a law firm’s IT staff or a technology consultant.

Verizon’s 2014 Data Breach Investigation Report concludes that “encryption is as close to a no-brainer solution as it gets” for lost or stolen devices. Attorneys who do not use encryption on laptops, smartphones, and portable devices should consider the question: Is failure to employ what many consider to be a no-brainer solution taking competent and reasonable measures?

Secure email is another safeguard with limited reported use by responding attorneys. Overall, 29% of respondents reported that they use encryption of email for confidential/privileged communications/documents sent to clients (down from 36% last year). This ranges from 19% for solos, gradually increasing to 70% with firms of 50-99 and 73% for firms of 500+. Firms of 100-499 are an exception, with only 47% reporting use of encryption for email. Another question asks about registered/secure email, which appears to also include encryption. Overall, 18% report using registered/secure email, increasing directly with firm size from 12% for solos to 36% for firms with 500+. If there is no overlap between this response and the use of encryption, the overall percentage using email security would be 47% overall, increasing with firm size to 100% of firms with 500+.

Email encryption has now become easy to use and inexpensive with commercial email services. Google and Yahoo, at least in part driven by the disclosures about NSA interception, announced in 2014 that they would be making encryption available for their email services. In its announcement, Google compared unencrypted email to a postcard and encryption as adding an envelope. This postcard analogy has been used by security professionals for years. Hopefully, the percentages of attorneys reporting that they have added the envelopes, where appropriate, will grow in future survey results.

During the last several years, some state ethics opinions have increasingly expressed the view that encryption of email may sometimes be required to comply with attorneys’ duty of confidentiality. On May 11, 2017, the ABA issued Formal Opinion 477, Securing Communication of Protected Client Information. The Opinion revisits attorneys’ duty to use encryption and other safeguards to protect email and electronic communications in light of evolving threats, developing technology, and available safeguards. It suggests a fact-based analysis and concludes “the use of un-encrypted routine email generally remains an acceptable method of lawyer-client communication,” but “particularly strong protective measures, like encryption, are warranted in some circumstances.” It notes that attorneys are required to use special security precautions, like encryption, “when required by an agreement with the client or by law, or when the nature of the information requires a higher degree of security.”

If encrypted email is not available, a strong level of protection can be provided by putting the sensitive information in an encrypted attachment instead of in the text of the email. In current versions of Microsoft Office, Adobe Acrobat, and WinZip, setting a password for the document encrypts it. While password protection of documents is not as strong as encryption of a complete email and attachments because it depends on the strength of the password, it is much more secure than no encryption. If this approach is used, it is important to securely provide the passwords or passphrase to the recipient(s), preferably through a different communication channel like a phone call or text message (and certainly not in the email used to send the document).

Overall, a low percentage of respondents report using password protection for documents. There is not a pattern by firm size, with a low of 12% reported by solos and a high of 35% reported by firms of 100-499.

It has now reached the point where all attorneys should generally understand encryption and have encryption available for use in appropriate circumstances.

Some Basic Security Tools

In addition to authentication and encryption, the 2018 Survey asks about various security tools that are available to responding attorneys. Most, if not all, of these tools are security basics that should be used by all attorneys and law firms.

The most common tool is the spam filter, used by 87% of respondents. This may be under-reported because most email service providers have at least basic spam filters. Spam filters can be a strong first line of defense against phishing (malicious emails that try to steal information or plant malware). Filters are only part of the defense that weeds out some phishing emails but are an important first step.

Other tools with high reported use include anti-spyware (80%), software-based firewalls (80%), antivirus for desktops/laptops (73%), for email (69%), for networks (66%), and hardware firewalls (57%). Use of intrusion detection and prevention systems is reported by about 33% of respondents overall. There has been a growing trend for a number of years to use security suites that combine some of these tools like malware protection, spyware protection, software firewalls, and basic intrusion protection in a single tool. Availability of the various security tools is generally stable across firms of all sizes, with increases for some of them with the size of the firm. For all of these security tools, the use by firms should be 100%. There is a generally low incidence of “don’t know” responses for these tools, about 7% overall.

Remote Access

Approximately 90% of respondents reported that they remotely access work assets other than email, like applications and files, consistent with today’s mobile practice of law. 39% report regular use of remote access, 31% report occasional use, and 19% report “seldom.” Reported use generally increases with firm size, reaching 68% for firms of 500+. Respondents report using the following security measures: web-based applications (42%), virtual private networks (VPNs) (37%), remote access software (30%), and other (10%). Security for remote access is critical because it can provide unauthorized access for outsiders (to the communication or network) if it is not properly secured with an encrypted communication connection and strong authentication. There is a growing practice of using multifactor authentication or two-step verification for authentication in remote access. It requires a second method of authentication, in addition to a password, like a set of numbers transmitted to a smartphone or generated by an app. Multiple inexpensive and easy-to-use options are available.

Wireless Networks

Public wireless (WiFi) networks present a high-security risk, particularly if they are open, as in not requiring a password for connection. Without appropriate security measures, others connected to the network—both authorized users and attackers—may be able to intercept or view data and electronic communications transmitted over the network. The 2018 Survey asks about security measures that attorneys use when accessing public wireless networks. 31% report that they do not use public wireless networks. Overall, 38% report that they use a VPN (a technology that provides an encrypted connection over the internet or other networks), 20% report that they use remote access software, 15% report that they use website-provided SSL/HTTPS encryption, and 0.6% report using other security measures. The remaining 15% are living dangerously, reporting that they use none of the security measures.

Cell carriers’ data networks generally provide stronger security than public WiFi, either with access built into a smartphone, tablet, or laptop, or by using a smartphone, tablet, or separate device as a personal hotspot.

Up-to-date equipment and secure configuration (using encryption) are also important for a law firm and home wireless networks.

Disaster Recovery/Business Continuity

Threats to the availability of data can range from failure of a single piece of equipment to a major disaster like a fire or hurricane. An increasing threat to attorneys and law firms of all sizes is ransomware, generally spread through phishing. It encrypts a user’s or network’s data and demands ransom (to be paid by Bitcoin) for release of the decryption key. Effective backup, which is isolated from production networks, can provide timely recovery from ransomware.

Overall, 17% of respondents report that their firm had experienced a natural or man-made disaster, like a fire or flood. The highest incidence, about 32%, was in firms of 50-99 and 500+. The lowest reported incidence was for solos at 10%, with the rest were between these numbers. Disasters of this kind can put a firm out of business temporarily or permanently. These positive responses, from 10% to 32% of respondents, and the potentially devastating results demonstrate the importance for law firms of all sizes to be prepared to respond and recover.

Despite this clear need, only 40% overall of responding attorneys report that their firms have a disaster recovery/business continuity plan. Firms with a plan generally increase with the size of the firm, ranging from 22% of solos to over 85% of firms with 50-99 and 500+ attorneys. As with comprehensive security programs, all law firms should have a disaster recovery/business continuity plan, appropriately scaled to its size.

In the equipment failure area, 34% of respondents reported that their firm experienced a hard drive failure, while 44% reported that they did not. The remainder reported that they do not know, with the “don’t knows” increasing by firm size. In firms of 500+, 73% responded that they don’t know. In firms of 100-499, it was 61%. It is very likely that most large firms have suffered multiple hard drive failures, just not known by the individual responding attorneys. Even limiting the analysis to known hard drive failures, they have impacted about one-third of respondents. That’s a high risk, particularly considering the potential consequences of lost data, and all attorneys and law firms should implement backup and recovery measures.

Backup of data is critical for business continuity, particularly with the current epidemic of ransomware. Fortunately, most firms report that they employ some form of backup. Only 1.5% report that they don’t back up their computer files. 21% of respondents report that they don’t know about backup. The most frequently reported form of backup is external hard drives (38%), followed by offsite backup (30%), online backup (30%), network attached storage (15%), USB (9%), tape (7%), RAID (7%), CDs (4%), and DVDs (4%).

The 2018 Survey responses show that 49% of respondents back up once a day, 22% more than once a day, 11% weekly, 5% monthly, and 2% quarterly. 8% report that they don’t know, with unknowns increasing with firm size. Attorneys and firms that don’t back up on a daily basis, or more frequently, should reevaluate the risk in light of ransomware, hardware failures, disasters, and other incidents reported in the 2018 Survey.

Conclusion

The 2018 Survey provides a good overview, with supporting details, of what attorneys and law firms are doing to protect confidential information. Like the last several years, the data generally shows increasing attention to security and increasing use of the covered safeguards but also demonstrates that there is still a lot of room for improvement. Attorneys and law firms who are behind the reporting attorneys and firms on safeguards should evaluate their security posture to determine whether they need to do more to provide, at minimum, competent and reasonable safeguards—and hopefully more. Those who are in the majority on safeguards, or ahead of the curve, still need to review and update their security as new technology, threats, and available safeguards evolve over time. Effective security is an ongoing process, not just a “set it and forget it” effort. All attorneys and law firms should have appropriate comprehensive, risk-based security programs that include appropriate safeguards, training, periodic review and updating, and constant security awareness.

The post TECHREPORT 2018: Cybersecurity appeared first on Law Technology Today.

LawTechnologyTodayOrg?d=yIl2AUoC8zA LawTechnologyTodayOrg?d=qj6IDK7rITs


source http://www.lawtechnologytoday.org/2019/01/techreport-2018-cybersecurity/

Friday, January 25, 2019

Disability Rights Activities Sue Bird, Lime Scooters

Electric scooter rental companies have been hit with numerous suits over the last few years, but few will be as hard for the companies to handle as the new crop of disability suits. Recently, a class action was filed against the City of San Diego, Lime, Bird, and Razor for violating the rights of disabled people through the public's use of their e-scooters. Can the courts come up with a better solutions than the defendants have? Or have the lines in the sand finally been drawn?

Plaintiffs Claim Scooter Companies Violate Their ADA Rights

The plaintiff in this lawsuit is the non-profit group Disabilities Rights California (DCA), on behalf of Alex Montoya, Rex Shirley, Philip Pressel, Aaron Gresson and other people with disabilities. DCA claims its members' rights, as protected by the American with Disability Act (ADA), have been violated be defendants neglecting to keep the city's sidewalks clear of dockless rental scooters. Those that are visually impaired, or use wheelchairs and walkers, are at a greater risk of harm and injury by these scooters than others, due to their disabilities, and they are asking for the courts to come up with a solution that will work for everyone, in light of their ADA protected rights.

Sidewalks Are Becoming a Safety Risk for the Disabled

According to local laws and scooter rental agreements, scooters are not be driven or parked on the sidewalks. However, scooter executives and city officials are both aware that these rules are broken daily by many scooter riders. In the lawsuit, DCA describes the challenges two of its members face on a regular basis due to the scooters. Montoya, born without arms and one leg, and Gresson, who is blind, state that because of their disability, they cannot prepare for being struck by oncoming scooters. "The dockless scooter riders often ride the Scooters on the sidewalk, turning the sidewalk into a vehicle highway rather than a space for safe pedestrian access and use," the lawsuit said.

Not only are disabled individuals feeling assaulted, but they are also feeling trapped. In another example listed in the lawsuit, dockless scooters blocked the entrance to Shirley's home, and he was therefore unable to leave his home. "People with disabilities who wish to travel in the City using the City's walkways are being forced to either put their physical safety at risk or just stay home. This is not a choice that they should have to make," the lawsuit said.

Will Cities and Scooter Companies Finally Turn on Each Other?

As the saying goes, "politics makes strange bedfellows", but so do lawsuits. Both the scooter companies and the city are named as defendants. Historically, scooter companies rarely gave cities' any notice before scattering their scooters throughout town, much to the dismay of many residents and city officials. Such lack of notice did not get the relationship between cities and scooter companies started on the right foot. But they have tried to work it out, for the promise of solving the "last mile dilemma" for public transportation takers.

Many cities kicked the scooter companies out. Now the ones that have retained the scooters are being hit by ADA lawsuits, which plaintiffs often win. Will cities continue to stick by scooter companies, even at the risk of lawsuits by their local citizens and public rights groups? Or will the cities finally turn on the scooter companies once and for all? This lawsuit will be a great test to their relationship.

If you or someone you love is hit by a motorized scooter driver, contact your local personal injury attorney. A lawyer can help you sort out the local laws, apply the facts in your case, and help get your expenses covered.

Related Resources:

Injured?d=yIl2AUoC8zA Injured?d=qj6IDK7rITs Injured?i=8LikHG2ErS0:aaqJOIK3MH0:gIN9vF


source http://blogs.findlaw.com/injured/2019/01/disability-rights-activities-sue-bird-lime-scooters.html

How to Go Paperless in 2019: A Month-by-Month Plan

Was Lao Tzu thinking of law offices in the 21st century when he wrote, “A journey of a thousand miles begins with a single step,” in the 6th century B.C.? 

Without question. There’s a reason the e-book, The Paperless Law Office, is the most popular one my team has ever produced: Lawyers understand the criticality of ditching physical files, but a lot of times they get hung up how to start what seems like a herculean task.

For those struggling with going paperless, let 2019 be different. If you follow this month-by-month advice and take it step-by-step, by the end of the year you’ll be set up for success going forward.

January: Commit to Starting Slowly and Chipping Away

Do you want to go paperless? Commit to it, and realize that after this 12-month plan is over, your office will operate with a lot less stress and waste. According to legal technology speaker Bryan Sims on a recent episode of the 10-Minute Law Firm Podcast, going paperless is the single most important thing you can do to run a more efficient law practice.

So this month make a commitment: You will chip away at going paperless step by step. You will approach the project with grit and determination, never getting knocked off track by setbacks.

You will overcome resistant employees, removing them from their roles if need be, because you deserve a more profitable and stress-free enterprise.

February: Determine Your Process

We’re taking things nice and slow, so before we rush headlong into purchasing bunch of expensive technology, we must first sketch out a process.

Specifically, you need to define how you will handle two situations: first, how you will handle internally created documents and second, how to handle externally created documents. For more information and to get some ideas, watch this recording of a webinar we did with Sims last year.

Once you define this process, create a checklist that your staff must follow. Discipline is key here: everyone must follow the same steps or chaos will ensue.

March: Establish Naming and Filing Conventions

As part of your process review, you and your team might get hung up how to name something and where to put it. This may or may not come as a shock, but these sorts of discussions can become quite passionate.

For this reason, I recommend defining your overall folder structure and file naming conventions separately from your overall paperless workflow. It will build momentum and make things simpler.

For suggestions, or better yet a or a complete playbook on how to name your files and structure folders, a guide created by paperless lawyer Andrew Kucera can help you.

April: Get Desktop Scanners

It’s time to make the plunge and buy hardware. And the best move is to get desktop scanners and put them on everyone’s desks. It doesn’t make sense to have one central garbage can in your office, does it? So it doesn’t make sense to have one central scanning resource either.

You are a document professional, so get the best document tools. Do not get multi-function devices, such as printer/copier/scanner/fax machines. These devices compromise functionality since they support so many tasks.

I share the opinion of many legal tech experts that the best solution for desktop scanners is the Fujitsu ScanSnap ix500. For approximately $400 (at the time this article was written) these machines come with PDF creation software, process 25 double-sided pages per minute, and perform all sorts of wonderful tasks.

May: Choose Online File Storage Provide

I recommend choosing an online storage provider that syncs automatically with your desktop or laptop and am a big fan of Google Drive. I already use Gmail, Google Calendar, other G Suite tools, and Google Drive plays really well with them.

I recommend smaller law firms look at specialized document storage tool like Dropbox, Box, iCloud, or OneDrive. Larger organizations might want to stick to NetDocuments, Box, or Google Drive.

Now stop and smell the roses! Summer is coming, and at this point, you’re pretty paperless: you’re scanning documents, have processes defined, have consistent file and folder conventions, and you’re backing your documents up securely. Nice work!

June: Automate Your Billing and Collections

One of the biggest forms of waste in a law firm is sending out paperless bills and waiting for checks. This onerous process requires many people-hours, is a slow way to collect revenue, and is out of step with how many modern clients want to pay.

Furthermore, you end up collecting a much higher percentage of your invoices with electronic billing, which more than compensates for credit card fees.

Instead of printing, folding, stuffing, stamping, addressing, and sending invoices, with paperless billing you click a button and invoices are emailed out to clients. They can then pay online with debit or credit cards and you have your money the next day.

To learn how to embrace paperless billing, this e-book can get you started.

July: Automate Simple Documents with Document Assembly!

Consider the humble engagement letter: imagine if you could collect information about a new client during your intake process and then instantly generate a document.

Document assembly allows you to click a button and create a document from fields you’ve saved in a database. It scares attorneys, especially ones who are not very technically-savvy, but the reality is it’s not too tough to do and the benefits are amazing.

July is usually one of the slower months for law firms, so use it to expand your knowledge and add this critical skill to your toolset.

There are many ways to start – you are probably already using Microsoft Word, so learning about Mail Merge fields will help you get started. This is how Rocket Matter’s and other practice management software document assembly tools work.

There are also more powerful tools such as HotDocs, which are better suited for more complicated document production.

August: Use Summer Slowdown to Scan Backlog

You have a decision to make: do you want to scan all of your documents or just your active cases? Personally, I’m lazy. I prefer to scan only the active stuff I’m working on.

That said, there is a lot to catch up on even if you’re only scanning your active files. It’s best to approach this task little by little, and start doing it gradually throughout the year. But when August hits and business slows, take advantage of the downtime to really make a dent in your scanning backlog.

September: Embrace Mobile Paperless Tools

If you haven’t done so already, start taking advantage of the tools you can use on the digital Swiss Army Knives we carry with us at all times: smartphones and tablets.

Smartphones allow for scanning-on-the go functionality. The cameras in the latest models are incredible, and perfect for getting a document quickly into your system.

iAnnotate makes it possible for you to write on PDFs using a tablet—this is just one of many PDF tools you can find for markup. And the online document storage tools you implemented in May pay dividends: no matter where you are (as long as you have a data plan or internet connection), you can pull up your files.

October: Automate Pleadings and More Complex Documents

It’s time to take the next step with our document assembly project that we started in July. Hopefully, at this point, you’ve dipped your toes in the waters of doc automation with your engagement letter and are happily and efficiently onboarding clients.

Now it’s time to really ratchet up your efficiencies! Make a list of the top 10 documents your law firm creates on a regular basis and convert those into document templates.

Spend some time learning what Microsoft Word can do with mail merge fields, such as if-then-else logic, prompting for questions, and special formatting. You will be amazed. You can switch pronouns based on gender, swap paragraphs out based on conditions, and significantly reduce the errors as well as time in document production.

November: Realize it’s Okay to Still Use Some Paper

Not everything need be digitized. Even the most paperless of law firms still use paper. Paper is still great for note-taking. For me, no stylus and tablet can reproduce the beautiful tactile experience of writing with my favorite pen. And handwritten notes are still special, even more so in our noisy, social media-infected world.

December: Reflect on Success, Plan Improvements for 2020

Congratulations! You did it! It took twelve months, but you took it nice and slow, and now you don’t have to spend 15 minutes looking for files. You can view them from anywhere you are. You can work from home more. You have more time on your hands because creating documents takes a single click. And you’re collecting more money than ever because of your conversion to electronic payments.

Our work is not done here. Now that you’ve got the fundamentals down, it’s time to scout for more inefficiencies in your processes. What can you do better? How can you run an even better firm for 2020?

The post How to Go Paperless in 2019: A Month-by-Month Plan appeared first on Law Technology Today.

LawTechnologyTodayOrg?d=yIl2AUoC8zA LawTechnologyTodayOrg?d=qj6IDK7rITs


source http://www.lawtechnologytoday.org/2019/01/how-to-go-paperless-in-2019/